Indexes...................................................................................................................................................................64
Using Multiple Indexes.............................................................................................................................................65
Fast Database Import....................................................................................................................................................66
Advanced...........................................................................................................................................................................67
Result Sets...................................................................................................................................................................67
Statements that Return a Result Set.........................................................................................................................67
Limiting the Number of Rows...................................................................................................................................67
Large Result Sets and External Sorting......................................................................................................................67
Large Objects...............................................................................................................................................................68
Storing and Reading Large Objects...........................................................................................................................68
When to use CLOB/BLOB..........................................................................................................................................68
Large Object Compression........................................................................................................................................68
Linked Tables...............................................................................................................................................................68
Updatable Views...........................................................................................................................................................68
Transaction Isolation.....................................................................................................................................................69
Table Level Locking.................................................................................................................................................69
Lock Timeout...........................................................................................................................................................69
Multi-Version Concurrency Control (MVCC).....................................................................................................................70
Clustering / High Availability..........................................................................................................................................70
Using the CreateCluster Tool....................................................................................................................................70
Detect Which Cluster Instances are Running.............................................................................................................71
Clustering Algorithm and Limitations.........................................................................................................................71
Two Phase Commit.......................................................................................................................................................71
Compatibility.................................................................................................................................................................72
Transaction Commit when Autocommit is On.............................................................................................................72
Keywords / Reserved Words.....................................................................................................................................72
Standards Compliance...................................................................................................................................................72
Supported Character Sets, Character Encoding, and Unicode......................................................................................72
Run as Windows Service................................................................................................................................................72
Install the Service....................................................................................................................................................72
Start the Service......................................................................................................................................................72
Connect to the H2 Console.......................................................................................................................................73
Stop the Service......................................................................................................................................................73
Uninstall the Service................................................................................................................................................73
Additional JDBC drivers............................................................................................................................................73
ODBC Driver.................................................................................................................................................................73
ODBC Installation....................................................................................................................................................73
Starting the Server...................................................................................................................................................73
ODBC Configuration.................................................................................................................................................74
PG Protocol Support Limitations................................................................................................................................74
Security Considerations............................................................................................................................................74
Using Microsoft Access.............................................................................................................................................74
Using H2 in Microsoft .NET............................................................................................................................................74
Using the ADO.NET API on .NET...............................................................................................................................75
Using the JDBC API on .NET.....................................................................................................................................75
ACID............................................................................................................................................................................75
Atomicity.................................................................................................................................................................75
Consistency.............................................................................................................................................................75
Isolation..................................................................................................................................................................75
Durability................................................................................................................................................................76
Durability Problems.......................................................................................................................................................76
Ways to (Not) Achieve Durability..............................................................................................................................76
Running the Durability Test......................................................................................................................................76
Using the Recover Tool.................................................................................................................................................77
File Locking Protocols....................................................................................................................................................77
File Locking Method 'File'..........................................................................................................................................77
File Locking Method 'Socket'.....................................................................................................................................78
File Locking Method 'FS'...........................................................................................................................................78
File Locking Method 'Serialized'......................................................................................................................................78
Using Passwords...........................................................................................................................................................78
Using Secure Passwords...........................................................................................................................................78
Passwords: Using Char Arrays instead of Strings........................................................................................................79
Passing the User Name and/or Password in the URL..................................................................................................79
Password Hash.............................................................................................................................................................79
Protection against SQL Injection....................................................................................................................................80
What is SQL Injection..............................................................................................................................................80
Disabling Literals.....................................................................................................................................................80
Using Constants.......................................................................................................................................................80
Using the ZERO() Function.......................................................................................................................................81
Protection against Remote Access..................................................................................................................................81
Restricting Class Loading and Usage..............................................................................................................................81
5 of 176